By Alan Solomon

Laptop viruses usually are not unavoidably an immense catastrophe regardless of what's occasionally written approximately them. yet a pandemic an infection is at the least a nuisance, and almost certainly can result in lack of information. ordinarily it's the user's panic response to researching a pandemic an infection that does greater than the virus itself. This e-book demystifies laptop viruses, offering transparent, actual information regarding this rather new computer challenge. It allows managers and workstation clients to formulate a suitable reaction; sufficient for prevention and healing, yet no longer `over the top'. Over 100 percent viruses and versions are documented intimately. you're advised find out how to realize every one, what it does, the way it copies itself, and the way to cast off it. different helpful and suitable technical details is additionally supplied. thoughts for facing strength and real virus outbreaks are defined for company, educational and different environments, with the emphasis on brilliant yet no longer unreasonable precautions. All clients of IBM computer or suitable desktops - from unmarried machines to significant LAN's - will locate this e-book worthwhile. All that's required is a operating wisdom of DOS. Dr. Alan Solomon has been engaging in fundamental learn into workstation viruses considering the fact that they first seemed, and has constructed the best-selling virus security software program Dr. Solomon's Anti-Virus Toolkit.

Show description

Read or Download PC Viruses: Detection, Analysis and Cure PDF

Best management information systems books

Information Sharing on the Semantic Web (Advanced Information and Knowledge Processing)

Information fresh examine in components akin to ontology layout for info integration, metadata iteration and administration, and illustration and administration of disbursed ontologies. offers determination help at the use of novel applied sciences, information regarding strength difficulties, and directions for the profitable program of current applied sciences.

Beautiful Teams: Inspiring and Cautionary Tales from Veteran Team Leaders

What is it prefer to paintings on an outstanding software program improvement crew dealing with an most unlikely challenge? How do you construct a good crew? Can a gaggle of people that do not get alongside nonetheless construct solid software program? How does a crew chief continue every body on the right track whilst the stakes are excessive and the agenda is tight? appealing groups takes you behind the curtain with essentially the most attention-grabbing groups in software program engineering heritage.

Network Security, Administration and Management: Advancing Technologies and Practice

Community safety, management and administration: Advancing applied sciences and Practices identifies the most recent technological options, practices and rules on community defense whereas exposing attainable safety threats and vulnerabilities of latest software program, undefined, and networked structures. This ebook is a set of present study and practices in community protection and management for use as a reference by way of practitioners in addition to a textual content via academicians and running shoes.

Additional info for PC Viruses: Detection, Analysis and Cure

Example text

This third method mayor may not be in breach of copyright, depending on the laws of the country where it is done. But it certainly is one of the most widely used methods. It is a pity that this is true, because many companies report that they are using more than one scanner, on the assumption that perhaps the second scanner will pick up anything that the first misses. If the two scanners are using the same database, then they are really using one scanner. Unfortunately, scanners tend not to admit that they are using signatures culled from another source.

N one of the known versions of Brain infect hard disks, although this isn't a safe assumption to make aboutfuture versions, as I have heard rumours about versions that will infect hard disks. It is widespread in the Philippines (Manila), in Indonesia (Jakarta), and in Pakistan. It has spread through a number of US colleges, and is fairly widespread in UK technical colleges and a few universities. It has infected a UK software house, and (perhaps through them) Saudi, Qatar and Abu Dhabi, including a hospital there.

It is very easy to read the date/time of a file, and equally easy to set the date/time after changing it. In fact, this is done by almost every file virus that I've met so far. Nor, of course, does it make the slightest difference if a file is read-only. It is very easy to discover the attribute of a file, set it to read/write, do whatever you like to it, and then reset the attribute back the way you found it. The Types of Viruses and How They Operate 43 On a network, however, things are different.

Download PDF sample

PC Viruses: Detection, Analysis and Cure by Alan Solomon
Rated 4.56 of 5 – based on 39 votes